About This Session
A look at real-life best practices and practical experience in protecting your source code from prying eyes and malicious users. We will use Reflector and ILDASM to analyze code vulnerability, and evaluate appropriate defense mechanisms. Topics covered include naming conventions, obfuscation and control flow obfuscation, licensing, and general coding tips.
Time: 1:15 PM Sunday Room: 3402
The Speaker(s)
unassigned , unassigned
unassigned